Change Auditor Guide
Change Auditor Guide
9
Installation Guide
© 2017 Quest Software Inc.
ALL RIGHTS RESERVED.
This guide contains proprietary information protected by copyright. The software described in this guide is furnished under a
software license or nondisclosure agreement. This software may be used or copied only in accordance with the terms of the
applicable agreement. No part of this guide may be reproduced or transmitted in any form or by any means, electronic or
mechanical, including photocopying and recording for any purpose other than the purchaser’s personal use without the written
permission of Quest Software Inc.
The information in this document is provided in connection with Quest Software products. No license, express or implied, by
estoppel or otherwise, to any intellectual property right is granted by this document or in connection with the sale of Quest
Software products. EXCEPT AS SET FORTH IN THE TERMS AND CONDITIONS AS SPECIFIED IN THE LICENSE
AGREEMENT FOR THIS PRODUCT, QUEST SOFTWARE ASSUMES NO LIABILITY WHATSOEVER AND DISCLAIMS ANY
EXPRESS, IMPLIED OR STATUTORY WARRANTY RELATING TO ITS PRODUCTS INCLUDING, BUT NOT LIMITED TO, THE
IMPLIED WARRANTY OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE, OR NON-INFRINGEMENT. IN NO
EVENT SHALL QUEST SOFTWARE BE LIABLE FOR ANY DIRECT, INDIRECT, CONSEQUENTIAL, PUNITIVE, SPECIAL OR
INCIDENTAL DAMAGES (INCLUDING, WITHOUT LIMITATION, DAMAGES FOR LOSS OF PROFITS, BUSINESS
INTERRUPTION OR LOSS OF INFORMATION) ARISING OUT OF THE USE OR INABILITY TO USE THIS DOCUMENT, EVEN
IF QUEST SOFTWARE HAS BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES. Quest Software makes no
representations or warranties with respect to the accuracy or completeness of the contents of this document and reserves the
right to make changes to specifications and product descriptions at any time without notice. Quest Software does not make any
commitment to update the information contained in this document.
If you have any questions regarding your potential use of this material, contact:
Quest Software Inc.
Attn: LEGAL Dept.
4 Polaris Way
Aliso Viejo, CA 92656
Refer to our website (https://www.quest.com) for regional and international office information.
Patents
Quest Software is proud of our advanced technology. Patents and pending patents may apply to this product. For the most current
information about applicable patents for this product, please visit our website at https://www.quest.com/legal.
Trademarks
Quest, the Quest logo, and Join the Innovation are trademarks and registered trademarks of Quest Software Inc. For a complete
list of Quest marks, visit https://www.quest.com/legal/trademark-information.aspx. All other trademarks and registered trademarks
are property of their respective owners.
Legend
CAUTION: A CAUTION icon indicates potential damage to hardware or loss of data if instructions are not followed.
IMPORTANT NOTE, NOTE, TIP, MOBILE, or VIDEO: An information icon indicates supporting information.
Installation Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5
Before you begin . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5
System requirements . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7
System statistics and facilities . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7
Network traffic . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7
Interval settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7
System overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8
Installation overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9
Multi-Forest Deployments . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 40
Multi-forest deployment requirements . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 40
Installation example . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 42
Configuration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 43
Audit and protection configuration flow . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 43
Event flow . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 45
Reports and queries from the client . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 46
Agent Comparison . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 51
About us . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 68
We are more than just a name . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 68
Our brand, our vision. Together. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 68
Contacting Quest . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 68
Technical support resources . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 68
Network traffic
• 1 to 3 KB of TCP traffic is generated per audit event sent from a Change Auditor agent to a Change Auditor
coordinator.
• 1 to 3 KB of TCP traffic is generated per record upon a successfully run search query.
• 1 KB of TCP traffic is generated every five minutes to update the Change Auditor agent statistics, which are
displayed on the Agent Statistics page.
NOTE: There are other network communications, primarily the agent downloading licensing, or configuration
data from the coordinator. This configuration can be large, depending on the auditing modules licensed and
how they are configured.
Interval settings
Table 1. Interval settings
Setting Description
Connection Interval Every five minutes a Change Auditor agent tries to establish a connection or
communication channel with a Change Auditor coordinator.
NOTE: Connection attempts can also be triggered when an agent loses its
connection to the coordinator, where the agent tries to re-establish a
connection.
Forwarding Interval Every five seconds an agent forwards all the audited events stored in the
local queue (agent’s database) to a Change Auditor coordinator. These
audited events have not been previously sent to the coordinator.
This interval is configurable using the Configuration Setup dialog.
Setting Description
Polling Interval Every 900 seconds (15 minutes) the agent checks to determine if there have
been any modifications to the agent’s configuration.
This interval is configurable using the Configuration Setup dialog.
Retry Interval If the agent does not receive an immediate success acknowledgment from
the coordinator for the audited events it transmitted, the agent resends all
unacknowledged events after five minutes (300 seconds) from the previous
attempt.
This interval is configurable using the Configuration Setup dialog.
System overview
Change Auditor agents are deployed to all servers (domain controllers and member servers) tracking configuration
changes in real time. When a change is made on a server running a Change Auditor agent, the change
information (audit event) is captured by the agent, batched and forwarded to a Change Auditor coordinator, which
then inserts the event details into the Change Auditor database.
NOTE: If the Change Auditor for Logon Activity Workstations auditing module is licensed, you must deploy
agents to the workstations that you want to monitor.
For each change detected, an audit event entry is created in the Change Auditor database with the following
information:
• Type of configuration change event
• Time and date of the configuration change event
• Identity of the machine the change was made on
• Identity of the managed object the change pertains to
• Old and new value of the change (if applicable)
• IP address of the workstation and client where the change originated
The coordinator fulfills client and agent requests and generates alerts. Multiple coordinators can be installed in a
single forest and an agent can be connected to multiple coordinators simultaneously. All connected coordinators
can participate in receiving events from the agent, allowing a high volume of events to be distributed for
processing.
NOTE: Server agents submit events to all available coordinators to load balance automatically. However,
workstation agents randomly connect to a single coordinator. This design enables ‘scaling out’ options for
large workstation agent deployments within a single site.
The Change Auditor client provides immediate access to key configuration change information. From the client
you can:
• Install, upgrade, or uninstall agents
• Define search criteria to return specific events and view the search results
• Enable and disable alerts and view the events that triggered these alerts
Installation overview
Before installing Change Auditor, choose the SQL database to use. If you want to install the Change Auditor
database to a SQL instance other than the default instance of the selected SQL Server, create the instance before
running the installer.
Using the Change Auditor product DVD or running the autorun.exe file opens the Quest Change Auditor autorun,
allowing you to install the different Change Auditor components, access the product documentation, and install
other related Quest products and knowledge packs.
During the coordinator installation, you have the option of adding the current user to the Change Auditor
Administrators security group. If you select not to do this during the coordinator installation process, you need to
add your user account (and any other appropriate user accounts) to one of the Change Auditor security groups.
Quest also recommends that you add the Change Auditor Administrators and Change Auditor Operators groups to
the appropriate SQL database role. See Add Users to Change Auditor Security Groups for more information
regarding these security groups.
Open the client to deploy agents to the required servers. Also, if you have the Change Auditor for Logon Activity
Workstation auditing module licensed, deploy agents to the domain workstations you want to monitor. See Deploy
Change Auditor Agents for more details.
IMPORTANT: You must be a member of the Change Auditor Administrators group and have local
permissions to deploy agents.
You can optionally install the Change Auditor web client to access (search and report on) the data collected by
Change Auditor, create custom search queries, and perform administration tasks to manage Change Auditor. See
the Change Auditor Web Client User Guide for information about installing and running the web-based client.
Installation workflow
Quest recommends installing the Change Auditor components in the following order:
• Database (SQL Server) — Make sure the SQL server that you are going to use is available and the
installation account has SQL Server role as dbcreator. To host the Change Auditor database on a SQL
instance other than the default instance of the selected SQL Server, create the instance before running the
installer.
NOTE: The database name must not include embedded spaces, special characters, or
supplementary characters. For more details, see Microsoft’s database identifier documentation.
• Coordinator — When prompted, specify the SQL server to use and the installation account. The Change
Auditor database is created remotely on this server during the installation.
NOTE: During the coordinator installation, you are have the option of adding the current user to the
Change Auditor Administrators security group. If you did not add the current user during the
installation process or want to add extra user accounts to the Change Auditor security groups, add
them before running the client. We also recommend that you then add these security groups to the
appropriate SQL database role (that is, Change Auditor Administrators — <InstallationName> group
to the Change Auditor_Administrators role and ChangeAuditor Operators — <InstallationName>
group to the ChangeAuditor_Operators role). See Add Users to Change Auditor Security Groups.
• Client — After you have confirmed that the coordinator is functioning correctly, install the Change Auditor
client.
TIP: Quest recommends that you install the first Change Auditor coordinator and client, but do not
deploy agents until after you have installed required coordinators. When deploying agents, you can
select which installation to use for each of the agents.
• Agents — Open the client to deploy agents to your domain controllers and member servers. Also, if you
have Change Auditor for Logon Activity Workstation licensed, deploy agents to the domain to monitor for
logon activity.
• Web client — Optionally, install the web client on the IIS web server.
This topic provides instructions for installing Change Auditor coordinators and the Change Auditor client. See
Deploy Change Auditor Agents for instructions on deploying agents. See the Change Auditor Web Client User
Guide for instructions on installing and running the web-based client.
• Three installation-specific Active Directory security groups to enable access to the Change Auditor client
and shared overviews distributed using the Change Auditor web client.
▪ ChangeAuditor Administrators — <InstallationName>
▪ ChangeAuditor Operators — <InstallationName>
▪ ChangeAuditor Web Shared Overview Users — <InstallationName>
Where <InstallationName> is a unique name selected during the coordinator installation to isolate your
components from any other Change Auditor installation in your Active Directory forest.
NOTE: See the Change Auditor Web Client User Guide for more information about the
ChangeAuditor Web Shared Overview Users security group.
• Two SQL database roles (ChangeAuditor_Administrators and ChangeAuditor_Operators). These roles are
added to the Change Auditor database to facilitate database connections from an untrusted forest with the
least amount of privileges. The two roles allow administrators to control access to the Change Auditor
database through SQL security.
1 Verify that the user account used to run the coordinator installation is at least a Domain Admin in the
domain to which the coordinator server belongs.
2 Use an existing account or create a user account in Active Directory that Change Auditor will use to access
the SQL Server.
3 Create a SQL Login for this Active Directory user account and assign the following permissions to this
login: Server role: dbcreator
4 From the member server, insert the Change Auditor DVD or if you downloaded the product from the Quest
website, run the autorun.exe file.
5 Click Install for the Install Change Auditor Coordinator option to open the Change Auditor Coordinator
Setup wizard.
6 Enter the information requested in the Coordinator Setup wizard.
Review the table for additional information. This table only covers unfamiliar information. It does not include
all the wizard screens or field descriptions.
7 After you have entered all the requested information, click Install to start the installation process.
8 After the coordinator is installed, you can use the Quest Change Auditor autorun to install the client.
NOTE: Reboot the server if you have any other Quest solutions installed on this server.
2 Select the Install Change Auditor Client option to open the Client Setup wizard.
NOTE: If Microsoft .NET 4.6.1 is not installed on the computer, an extra screen is displayed
explaining that this application was not found and the install cannot continue. Click Close to stop the
client install. Download and install the required .NET version. After .NET is successfully installed,
restart the client installation.
Membership in the ChangeAuditor Administrators and ChangeAuditor Operators groups enable the client to
connect and authenticate to a coordinator; therefore, any user that is running a Change Auditor client must be
added to one of these groups. In addition, all users responsible for deploying agents must also be a member of the
ChangeAuditor Administrators group in the specified Change Auditor installation. If you are not a member of this
security group for this installation, you get an access denied error.
NOTE: If multiple coordinators are installed in a mixed mode environment, to connect to each coordinator,
you must add your user account to one of these groups on each of the member servers where the
coordinators reside.
To add user accounts to security groups (Domain in Windows 2000 mixed mode):
Use the Microsoft Computer Management tool to add the appropriate user accounts to one of the Change Auditor
groups:
1 From the member server where the Change Auditor coordinator is installed, right-click My Computer and
select Manage.
2 From the Computer Management dialog, expand Local Users and Groups and select Groups.
3 Right-click and select Properties on the group called ChangeAuditor Administrators — <InstallationName>
or ChangeAuditor Operators — <InstallationName>.
4 Click Add and browse to the appropriate user object.
5 Click OK to close the Computer Management tool.
6 To apply this change, log out and back in.
Adding the appropriate users to one of these groups allow the client to successfully connect to the coordinator.
2 When the web client is opened, log on by entering the user name (<Domain>\<UserName>) and password
of an authorized Active Directory account.
NOTE: Selecting the Remember Me check box retains your <Domain>\<UserName> on
subsequent sessions.
Quest recommends that you deploy a server agent to all servers (domain controllers and member servers) to track
configuration changes in real time. For workstations, deploy a workstation agent to only those that you want to
monitor for login activity. See Agent behavior notes for information about how the different types of agents connect
to the coordinators in your environment and the limits set for agent connections.
When a change is made on a server running an agent, the change information (audited event) is captured and
forwarded to the specified database.
NOTE: The agent database supports up to 3 GB. After the database size reaches this limit, no new events
are audited and the ‘Agent service has reached a critical load’ event is generated. This typically occurs when
an agent is disconnected from a coordinator for an extended period.
NOTE: See the Installation Notes and Best Practices for notes on deploying agents for Change Auditor for
Exchange and Change Auditor for Authentication Services.
NOTE: To install Change Auditor agents to monitor ADAM (AD LDS) instances on workgroup servers, run
the agent installer package (Quest Change Auditor Agent 6 (x64)).msi. See Install an agent to audit ADAM
(AD LDS) on workgroup servers for details.
NOTE: When you are using Active Roles, there is an extra integration step that you can take to capture the
user who initiated the change. See Active Roles Integration.
The Deployment page in the client displays all the servers and workstations discovered in your Active Directory
environment. From here, you specify the servers (and workstations) to host an agent. For a description of the
Deployment page, see the online help or Change Auditor User Guide.
NOTE: The Deployment page does not display nonmember objects, such as ADAM workgroup servers or
nondomain workstations, because agents cannot be deployed to non-member objects using the Deployment
tab. See Install an agent to audit ADAM (AD LDS) on workgroup servers for more information about
manually installing agents to workgroup servers. See Workstation Agent Deployment for more information
about manually installing agents to non-domain workstations.
Starting with Change Auditor 6.9, you cannot install an agent on the following Operating Systems: Windows 2003
SP2, Windows 2003 R2, or Windows 2008 SP2. During an agent install, if one of these operating systems is
detected, the latest version of the agent that supports the operating system is installed.
For example, when you install an agent on a Windows 2012 server, the 6.9 agent is deployed. When you deploy
an agent on a Windows 2008 SP2 server, the latest 6.8 agent is installed.
The following procedures step you through the process of deploying agents. See the Change Auditor User Guide
for procedures on using the advanced options and setting up auto deployment of new servers.
To deploy agents:
1 Verify that the user account you are using to deploy agents is at least a Domain Admin in every domain
that contains servers or workstations where agents will be deployed.
2 Verify that the user account is a member of the ChangeAuditor Administrators group in the specified
Change Auditor installation.
3 Open the client. If agents have not yet been deployed, select the Deployment tab. Otherwise, use View |
Deployment.
The Deployment page is populated with the servers (domain controllers and member servers) and
workstations in your Active Directory environment.
NOTE: The Deployment page may initially be empty until the current forest’s server topology has
been initially harvested. Topology scan takes a long time when the environment contains many
workstations. This page is automatically refreshed after this task has completed.
4 From this list, select an entry and select Credentials | Set to enter the proper user credentials for installing
agents on the selected domain.
On the Domain Credentials dialog, select the domain from the list and click Set. On the Logon Credentials
dialog, enter the credentials of a user with administrator rights on the selected domain.
5 After entering the proper credentials, select the entry back on the Deployment page and select Credentials
| Test. If you get a Valid Creds status in the Deployment Result column, you can start deploying agents to
that domain.
If you get a Logon Failure status in the Deployment Result column, use the Credentials | Set command
to enter the proper credentials for installing agents.
6 By default, the Change Auditor agent folders (Agent, Systray) are installed to
%ProgramFiles%\Quest\ChangeAuditor\. You can, however, change the location of the installation folder
by clicking Advanced Options.
7 Select one or more servers or workstations on the Deployment page and click Install or Upgrade.
8 On the Install or Upgrade dialog select one of the following options to schedule the deployment task:
▪ Now (default)
▪ When
If you select the When option, enter the date and time when you want the deployment task to initiate. Click
OK to initiate or schedule the deployment task.
9 As agents are successfully connected to the coordinator, the corresponding Deployment Result cell
displays ‘Success’, the Agent Status cell displays ‘Active’ and a desktop notification displays in the lower
right-hand corner of your screen.
NOTE: To deactivate these desktop notifications, select Action | Agent Notifications.
Once agents are deployed and you open the client, the Overview page opens and provides a real-time
stream of events based on a ‘favorite’ search definition and other summary information.
NOTE: After the deployment, the Version cell might display a previous version of an agent if you
installed the agent on an unsupported platform.
• Pre-upgrade considerations
• Upgrade Change Auditor
• Post upgrade considerations
Pre-upgrade considerations
Review these special considerations before running an upgrade.
5 After the Change Auditor Coordinator Setup wizard has successfully finished, wait until the coordinator
goes from an ‘Initializing’ status to a ‘Running’ status. To determine the coordinator’s status, right-click the
Change Auditor coordinator system tray icon and select the Coordinator Status option.
The Change Auditor 6.9 agent requires .NET 4.5.2. See the System statistics and facilities system requirements
for the list of supported platforms.
Starting with Change Auditor 6.9, the Change Auditor agent cannot be installed on the following Operating
Systems: Windows 2003 SP2, Windows 2003 R2, or Windows 2008 SP2. During agent upgrade, if one of these
operating systems is detected, the latest version of the Change Auditor agent that supports the operating system
is installed.
For example, when you upgrade a 6.7 agent with Change Auditor 6.9 on a Windows 2012 server, the 6.9 agent is
deployed. When you upgrade a 6.7 agent with Change Auditor 6.9 on a Windows 2008 SP2 server, the upgrade is
to the latest 6.8 agent.
If you are upgrading a 6.8 agent on an unsupported platform, the agent is upgraded to a newer 6.8 agent if it
determines that the deployed 6.8 agent is older than the 6.8 agent that is included with 6.9.
To capture new events and avoid losing any audited activities after an upgrade:
1 Upgrade an existing agent to version 6.9.
2 Create an Office 365 auditing template.
3 After applying new product licenses, restart the agents to capture the new events.
NOTE: When applying a new or updated license to a running coordinator (using CALicense.exe in the
ChangeAuditor Service installation directory), it can take up to 24 hours for the new license to deploy to the
connected agents. To deploy the license immediately, stop and restart the coordinator. This restart does not
interrupt event collection by the agents.
Permissions
Coordinator required permissions
User account performing the coordinator installation:
The user account installing the coordinator needs permission to perform the following tasks on the target server:
• Windows permissions to create and modify registry values.
• Windows administrative permissions to install software and stop/start services.
The user account performing the installation, must be a member of the Domain Admins group in the domain
where the coordinator is being installed.
Service account running the coordinator service (LocalSystem by default):
• Active Directory permissions to create and modify SCP (Service Connection Point) objects under the
computer object running a coordinator.
• Local Administrator permissions on the coordinator server.
If you are running the coordinator under a service account (instead of LocalSystem), define a Manual connection
profile where you can specify the IP address of the server hosting the coordinator. You can specify and select
connection profiles whenever you start the client. See the Change Auditor User Guide or online help for more
information on defining and selecting a connection profile.
• Coordinator - Install the coordinator. When prompted, specify the SQL server you are going to use and the
installation account. The Change Auditor database is created remotely on this server during the installation.
• Client - Once you have confirmed that the coordinator is functioning correctly, install the client.
TIP: Quest recommends that you install the first coordinator and client, but do not deploy agents until
after you have installed all of the additional coordinators required. When deploying agents you can
select which installation is to be used for each of the agents.
NOTE: During the coordinator installation, you can add the current user to the ChangeAuditor
Administrators security group. If you selected not to add the current user during the installation
process or want to add additional user accounts to the Change Auditor security groups, you need to
add them prior to launching the Change Auditor client. Quest also recommends that you then add
these security groups to the appropriate SQL database role (i.e., ChangeAuditor Administrators -
<InstallationName> group to the ChangeAuditor_Administrators role and ChangeAuditor Operators -
<InstallationName> group to the ChangeAuditor_Operators role). See Add Users to Change Auditor
Security Groups in the Change Auditor Installation Guide.
• Agents - Start the client to deploy agents to your domain controllers and member servers. Also, if you have
the Change Auditor for Logon Activity Workstation auditing module licensed, deploy agents to the domain
workstations to be monitored for logon activity.
• Web-based client — Optionally, install the web client on the IIS web server to allow users access to
Change Auditor data through a standard or mobile browser. See the Change Auditor Web Client User
Guide for information about installing and using the web client.
Security groups
During the coordinator installation, three installation-specific security groups are created in the domain where the
member server hosting a coordinator resides.
NOTE: If the scripting agent was not enabled on your Exchange servers before deploying agents, you
should perform backups of your Exchange servers in accordance with your company’s disaster recovery
plan once you have successfully deployed agents to all your Exchange servers.
If you need to restore your Exchange servers and they were NOT backed up after you deployed agents that
enabled the scripting agent, you will need to disable the CmdletExtensionAgent BEFORE recovering your
Exchange 2010/2013/2016 servers.
If Change Auditor cannot be installed on all your Exchange servers, use the following procedure on all Exchange
servers where an agent is not yet deployed:
1 Create an empty ScriptingAgentConfig.xml file under the following directory:
%ProgramFiles%\Microsoft\Exchange Server\V14\Bin\CmdletExtensionAgents\
Enter the following text into this ScriptingAgentConfig.xml file:
<?xml version="1.0" encoding="utf-8"?>
<Configuration version="1.0"/>
2 Save and close the file.
Exchange cluster node servers. When deploying or upgrading agents on Exchange cluster node servers, use
the following recommended procedure:
1 Deploy or upgrade the agent on the passive Exchange cluster nodes.
2 Perform a scheduled fail-over on the active cluster nodes.
3 Then deploy or upgrade the agent on the newly passive cluster nodes.
Agent deployment
You need deploy an agent on one of the SharePoint servers in the SharePoint farm that you want to monitor.
SharePoint settings
For Change Auditor to capture some of the SharePoint events, the following settings must be enabled:
• Native Auditing enabled for all SharePoint web applications (including each user site under
MySite)Change Auditor
NOTE: Log trimming is off by default. Enable log trimming to meet your policies. If the Change
Auditor agent is offline or is otherwise unable to retrieve event information from the SharePoint
database for a period longer than the trim period, events could be lost.
• Versioning enabled for each individual Library and List Item pertaining to the Sites, if you want Change
Auditor to capture versioning activities.
See the Change Auditor for SharePoint User Guide or Event Reference Guide for a list of the events that require
these additional settings.
Backup notes
Backup and protect the coordinator database
The coordinator uses Microsoft SQL Server as the main database for collecting and reporting audit information.
This data must be protected and backed up regularly, acceptable to your data retention policies. There are several
third-party tools available, including Microsoft’s SQL Tools, which provide backup and restore functions.
• Change Auditor 6.x server agents: Starting with Change Auditor 6.0, server agents submit events to all
coordinators in the site and load balancing occurs automatically. All connected coordinators can then
participate in receiving events from the server agent, allowing a high volume of events to be distributed for
processing.
• Change Auditor workstation agents: The workstation agents randomly connect to a single coordinator.
This enables ‘scaling out’ options for large workstation agent deployments within a single site.
NOTE: A maximum of 10,000 agents (server and workstation) can connect to a single coordinator. If this
connection limit is problematic for your environment, contact Quest Technical Support to discuss possible
configuration options.
Client notes
Disabled audit events
Some events are disabled by default to improve the initial deployment process and reduce the amount of audited
event information initially collected. These audited events can easily be enabled on the Audited Events page of the
Administration Tasks tab.
See the online help or appropriate Event Reference Guide for a list of the events that are disabled by default.
Multi-forest deployment
requirements
Network connectivity between each monitored forest
Coordinators in all forests connect directly to the SQL Server that is hosting the Change Auditor audit database.
Coordinators must resolve the host name of the SQL server or must be configured to use the IP address of the
SQL server.
Scenario A — One or more of the forests do not have a valid trust in place
• The SQL server must have SQL authentication enabled. By default, SQL Server Authentication is disabled
and must be manually enabled.
• The coordinator that is not part of the same forest where the SQL server is joined to, must be configured to
use a SQL user account, not a domain user account.
NOTE: This is required because SQL Server only allows Kerberos authentications when attempting
to connect using a Windows user account. Passing credentials is not allowed.
Forest A installation
1 Install the coordinator on a member server in Forest A. In this example, Coordinator1.ForestA.com is used
as the coordinator server.
▪ While installing the first coordinator, make note of the “Installation name”. The same installation
name is used to deploy the coordinator in Forest B (ForestB.net).
▪ Also take note of the SQL Server host and credential information. This server and account will also
be used in the second forest. The required information is as follows:
▫ SQL Server host name or IP address AND Instance name if applicable
▫ Database or Catalog name
▫ User name, password, and domain if applicable
2 Install the client on either a workstation or member server. In this example, CAClient1.ForestA.com is used
as the client computer.
3 Using the client, connect to the coordinator in Forest A to deploy Change Auditor agents on to the domain
controllers and/or member servers in Forest A. See Deploy Change Auditor Agents for more details about
deploying agents.
4 At this point, Change Auditor should be fully deployed to the first forest in the organization (ForestA.com in
this example).
Configuration
This section discusses how Change Auditor configurations are handled in multi-forest environments, including:
• Audit and protection configuration flow
• Event flow
• Reports and queries from the client
• You can also use the Coordinator Credential Configurator to change between coordinator domains at any
time after the agent is installed.
NOTE: The Coordinator Credential Configurator application can be launched using the
CoordinatorCredentialConfigurator.exe file in the agent installation folder on the workstation. The
default agent installation location is: %ProgramFiles%\Quest\ChangeAuditor\Agent
• More specific UAC policies can be configured in the Local Security Policy or a Group Policy Object (where
appropriate) to determine whether all Administrators or the built-in Administrator account are run in Admin
Approval Mode, the elevation prompt level, whether the secure desktop is used for prompting, whether
elevation is possible without prompting, and so forth.
NOTE: For workstation log management (such as Get Logs and View Agent Logs), the following must be
enabled on the workstation:
• Windows Management Instrumentation (WMI) in the firewall rule set (usually domain) on the
workstation
• Network Discovery and File Sharing
• Remote Registry Service set to ‘Start Automatically’. By default, this service is stopped and set to
‘Manual’ for Windows 7, 8/8.1, and 10.
Agent installation
NOTE: An agent must be installed on the server where the ADAM (AD LDS) instance to audit resides.
1 Copy the appropriate agent installer package from the Change Auditor service installation directory to the
workgroup server to monitor. The default directory is %ProgramFiles%\Quest\ChangeAuditor\Service\
Change Auditor Agent (x64).msi.
2 Run the installer file on the workgroup server to open the Change Auditor Agent wizard which steps you
through the installation.
3 Review the following table for additional requested information in this wizard. This table only covers
unfamiliar information. It does not include all the wizard screens or field descriptions.
Table 7. Change Auditor Agent wizard
This section covers the following topics for Active Roles integrations:
• Requirements
• Deploying Change Auditor/Active Roles integration scripts
• Client components added to Change Auditor
• Removing deployed Change Auditor/Active Roles integration scripts
• Troubleshooting Tips
Requirements
Active Roles
• Active Roles 6.9 through 7.2.
NOTE: To capture the additional events and initiator account information available with the latest
integration scripts, you must be running Active Roles 6.9 (or higher) with Change Auditor for Active
Directory 6.0 (or higher).
NOTE: To work with Active Roles 7.0, you must have installed: hotfix 7.0.2 SOL188024 for Active
Roles and at a minimum Change Auditor 6.7.1539, Change Auditor 6.8.1474, or Change Auditor 6.9.
NOTE: If both Active Roles versions 6.x and 7.0.2 SOL188024 are installed on the same server as a
side-by-side deployment, Change Auditor installs integration scripts to both.
• Microsoft .NET Framework 4.5 (or higher) must be installed and enabled on the target Active Roles server
• PowerShell 2.0 must be installed on the target Active Roles server
• PowerShell Execution policy must be set to ‘AllSigned’, ‘RemoteSigned’ or ‘Unrestricted’ on the target
Active Roles server. (For more information, see https://technet.microsoft.com/en-
us/library/ee176961.aspx.)
• Active Roles administrator right is required to deploy the integration scripts.
• The Change Auditor agents must be installed on all domain controllers in the environment to ensure that
the Active Directory changes are picked up.
Who tab
When using the Who tab to retrieve change events initiated by a specific user, changes initiated by Active Roles
are not automatically included in the search. A check box is available on the Who tab which instructs Change
Auditor to retrieve all change events initiated by the specified user, including those made through Active Roles and
GPOADmin.
7 Back on the Who tab, select the Include Event Source Initiator check box.
NOTE: Including the event source initiator, may have a noticeable effect on the search performance,
depending on the size of the database and the number of results returned in the search.
Email tags
Change Auditor/Active Roles integration email tags are available which can be added to the event details of alert
email notifications. These new email tags are:
• %EVENTSOURCE% - indicates the application where the change event came from: Change Auditor,
Active Roles, or GPOADmin.
• %INITIATORMAIL% - for events generated by Active Roles or GPOADmin, the email address of the user
that initiated the event.
• %INITIATORSID% - for events generated by Active Roles or GPOADmin, the SID of the user that initiated
the event.
• %INITIATORUSERNAME% - for events generated by Active Roles or GPOADmin, the name of the user
that initiated the event.
See the Change Auditor User Guide for more information about how to configure and enable email notifications
and customize email content.
Requirements
GPOADmin
• GPOADmin 5.9 to 5.11.1.
• The GPOADmin service account must be authorized to access the Change Auditor SDK. That is, add the
GPOADmin service account to the ChangeAuditor Administrators security group.
NOTE: If you must use a role with the minimum permissions, use the Application User Interface page
on the Administration Tasks tab to define a new role that contains the ‘Add Sdk’ and ‘View Sdk’
operations. Also, the GPOADmin service account must be added to the ChangeAuditor
Administrators group for integration to function properly.
NOTE: For more information on using the Application User Interface page to define a new role, see
the Change Auditor User Guide.
• Change Auditor auditing must be enabled GPOADmin server properties for events to generate.
Layout tab
Columns are added to the database to record the information retrieved from GPOADmin or Active Roles. These
columns are not displayed by default on a Search Results page for most searches. However, using the Layout tab
you can add the following information to all searches:
• EventSource - for all events, the name of the application from which the event was generated (i.e.,
Change Auditor, Active Roles, or GPOADmin).
• Initiator Mail - for events generated by GPOADmin or Active Roles, the email address of the user that
initiated the change.
• Initiator SID - for events generated by GPOADmin or Active Roles, the SID of the user that initiated the
change.
• Initiator UserName - for events generated by GPOADmin or Active Roles, the name of the user that
initiated the change.
Who tab
When using the Who tab to retrieve change events initiated by a specific user, changes initiated by GPOADmin will
not automatically be included in the search. A check is available in the Who tab which instructs Change Auditor to
retrieve all change events initiated by the specified user, including those made through GPOADmin.
7 Back on the Who tab, select the Include Event Source Initiator check box.
NOTE: Including the event source initiator, may have a noticeable effect on the search performance,
depending on the size of the database and the number of results returned in the search.
When this search is run, Change Auditor retrieves all events made by the specified user account, including
those initiated by GPOADmin.
In addition, when this check box is selected the Initiator UserName column is added to the Search Results
grid for this search. For events initiated by GPOADmin, this column contains the user account that was
logged into the GPOADmin console.
Email tags
The following email tags are available which can be added to the event details of alert email notifications:
• %EVENTSOURCE% - indicates the application where the change event came from: Change Auditor,
Active Roles, or GPOADmin.
• %INITIATORMAIL% - for events generated by GPOADmin or Active Roles, the email address of the user
that initiated the event.
• %INITIATORSID% - for events generated by GPOADmin or Active Roles, the SID of the user that initiated
the event.
• %INITIATORUSERNAME% - for events generated by GPOADmin or Active Roles, the name of the user
that initiated the event.
See the Change Auditor User Guide for more information on how to configure and enable email notifications and
customize email content.
• Verify that the GPO is not being protected by Change Auditor’s Group Policy Object Protection feature.
When configured, Change Auditor prevents all changes to GPOs, regardless of the tool that is used to
make the change (including GPOADmin).
• GPOADmin only sends initiator and comment information to Change Auditor for GPO deployment, working
copy check in, and working copy check out operations.
• It may be necessary to restart the GPOADmin service before correct initiator information can be retrieve by
Change Auditor. Before restarting the GPOADmin service, check the Change Auditor coordinator’s status
to ensure that the coordinator has been initialized and is running.
Agent options
Table 8. Change Auditor agent command line options
Coordinator options
Table 9. Change Auditor coordinator command line options
Contacting Quest
For sales or other inquiries, visit www.quest.com/contact.